Jeremy H. Email and Phone Number
Jeremy H. work email
- Valid
- Valid
- Valid
Jeremy H. personal email
- Valid
Jeremy H. phone numbers
With over 18 years of work experience in the IT and cybersecurity field, I am a passionate and versatile professional who can design, implement, and teach security solutions for various domains and platforms. I have a master of science degree in management information systems and multiple CompTIA certifications, as well as a CCSK credential. I am currently a cloud security architect at Changeis, a leading IT consulting and management firm that serves federal and commercial clients.In my role at Changeis, I guide and influence critical security architectural priorities, collaborate with various teams and stakeholders, and review and ensure compliance with applicable regulations. I also leverage my expertise in AWS and Azure cloud security, DevSecOps, and Python to develop and deploy secure and scalable solutions. Currently, I am a cybersecurity instructor, where I teach for a cybersecurity professional program bootcamp offered by prestigious universities across the country. I enjoy sharing my knowledge and skills with aspiring and current cybersecurity professionals, and helping them achieve their career goals.
Changeis, Inc.
View-
Systems Security ArchitectChangeis, Inc. Jun 2019 - PresentCollaborates with the Enterprise Security Team, Application Security Teams, IT Architect- Infrastructure experts, IT leadership, Operational Technology Architects to develop agreed to approaches on improving security controls and security posture including infrastructure in AWS and Azure. Reviews applicable regulations; designs and provides guidance on the deployment of the architecture and processes necessary to achieve and maintain compliance.Influences and evangelizes the Enterprise Security Strategy. Works with and influences key stakeholders at all levels (Managers, Directors, VPs, and Analyst to Senior Technical Staff) to drive architecture decisions to enable core business strategies in a secure and reliable fashion.Identifies new technology which can enhance security. Informs and educates IT and the business regarding potential benefits and applications. Assesses and advises on cyber risk from the very tactical/technical to business strategic. Quantifies and expresses business risk/benefits based upon security architecture decisions. Provides thoughtful leadership related to security with external stakeholders such as regulators.Define information security controls and patterns that support risk assessments and support development of secure architectures.Contribute to the Security Architecture for both pre-production and production environments. Collaborate with technology architecture teams by performing security analysis of proposed architectures, providing risk assessment feedback, including security requirements. Interact with Agile project teams to provide advice on security and assist with compensating control alternatives where security requirements cannot be met.Migration of on premise COTS ERP system, databases, and front-end web servers to AWS FedRAMP cloud environment.Provide local Continuous Monitoring plan operations and ensure their accurate tracking and artifact collection within specified frequency requirements. -
Lead InstructorStackroute Learning Sep 2024 - PresentTeaching and mentoring students actively pursuing their CompTIA A+, Security+ and CySA+ certifications covering the cyber domains of incident response, readiness and resilience, cybersecurity operations, NIST CSF and other frameworks, offensive/defensive security and purple teaming, defense-in-depth, MITRE ATT&CK, digital forensics, cryptography and Governance, Risk & Compliance. -
Technology And Security Solutions ExpertHudson Infotech Services Jan 2010 - PresentNorman, Ok, UsIT Consulting, Services, and SupportPCI ComplianceJSIG ComplianceHIPAA ComplianceRMF / NIST ComplianceAeroHive Wireless Certified ProfessionalInfrastructure Migrations to Amazon Web Services Cloud SolutionsReferences available upon request. -
Cyber Security InstructorThrivedx Sep 2020 - Oct 2023Miami, Fl, UsCybersecurity Professional Program Bootcamp for:SDSU Global CampusUNLV Continuing EducationU of Colorado Boulder Continuing EducationLayola University NONYU School of Professional StudiesUCF Boot CampsNJIT Digital Skills BootcampsUniversity of Michigan Nexus Digital Skills BootcampCourses:Cybersecurity IntroductionMicrosoft OS SecuritySystem Networking Fundamentals (TCP/IP)Linux OS SecurityCloud Security FundamentalsNetwork SecurityCyber Infrastructure & TechnologyPython for SecurityEthical HackingDigital Forensics and Incident Response -
Adjunct InstructorOklahoma State University-Oklahoma City Aug 2020 - May 2021Oklahoma City, Ok, UsNetwork Fundamentals -
Senior Cybersecurity Test Engineer - Awacs With ColsaUnited States Air Force Sep 2018 - May 2019Randolph Afb, Tx, UsProvides Cybersecurity test support to the 96th Operations Group - Det 2 Combined Test Force at Tinker AFB, Oklahoma. Program Lead that establishes the initial Cyber System Risk Analysis, Cooperative Vulnerability Investigation and Adversarial Cybersecurity Development Test & Evaluation Test methodology based on ongoing system Cybersecurity vulnerability investigations for AWACS. Documents methodology for the Cybersecurity CSRA, CVI and AC DT&E test process. Creates and executes test plans based on requirements from the war fighter and helps to reduce overall risk of implementation of new or existing modifications to equipment an aircraft. Collaboration with multiple government contractors and agencies to develop, coordinate, and execute test plans. -
Systems Security EngineerBoeing Jul 2017 - Sep 2018Arlington, Va, UsSupports systems security engineering on the AWACS major acquisitions programs. Works with the Program's systems engineers to develop systems security requirement definition, functional (architectural) definition and product definition; Executes systems security analyses, trade studies and engineering security risk assessments; implements and integrates the systems security design; Oversees systems security testing, including verification and validation. Supports the development of the Program Protection planning and execute protection plans for critical program information and technologies.Ensures information assurance controls are identified and implemented and collect the certification evidence required by the Risk Management Framework (RMF).Applies both leadership and technical skills in an Integrated Product Team environment with other engineers, customers and subcontractors. Participates in working groups that coordinate systems security engineering activities. Responsible for interfacing with all aspects of the program. -
Information Systems Security OfficerBoeing Jan 2016 - Jul 2017Arlington, Va, UsDeveloped and implemented new process and tools for management of computing requirements for systems and new security plans for 10 independent systems AWACS and Bombers and Weapons programsStreamlined team assessment findings of inspections to managementPartnered with IT to lead an ongoing project to test and implement Splunk.Conducting weekly system security auditsPerform security compliance assessments and analysis using automated scanning toolsConfiguration Management (CM) control and requirements elicitation for new systemsProvide information assurance guidance and oversightCollaborate with each program to facilitate the implementation of system security requirements on all systemsConduct weekly/monthly assessments to maintain oversight of assigned areas of responsibility and implement solutions to provide best security posture -
Systems Engineer (Contractor With Teksystems)Seagate Technology Nov 2015 - Jan 2016Fremont, Ca, UsBuild and deploy physical and virtual Red Hat Enterprise Linux 5 - 7 systems.Administration of over 1800 physical and virtual servers, server hosts, and server clusters on a high availability platform on VMware vSphere.Find and replace alerted faulty hardware in HP DL380e rack mounted server hardware. Provisioning/managing of disks/LUNs and SAN/NAS systemsVirtual storage, memory, and CPU managementManage and monitor all installed systems and infrastructureInstall, configure, test and maintain operating systems, application software and system management toolsProactively ensure the highest levels of systems and infrastructure availabilityMaintain security, backup, and redundancy strategiesWrite and maintain custom scripts to increase system efficiency and lower the human intervention time on any tasksParticipate in the design of information and operational support systemsLiaise with vendors and other IT personnel for problem resolutionInvolved with other technology operations including Hadoop, Puppet, GitHub, Open Stack, Zabbix, Nagios, and Solaris 8 - 11. -
Sr. It AnalystSeagate Technology Jul 2014 - Sep 2015Fremont, Ca, UsObtain file update details and file administration details from Unix/Linux servers. Replay EDI files in TIBCO directories in Dev, Staging, and Production environmentsTroubleshooting B2B EDI transactions for over 250 enterprise clients of Seagate utilizing Splunk Enterprise.Application performance testing with LoadRunner. Configuring scenarios to monitor and collect data of virtual users and performing diagnostics of issues.Tracking order status and details in Oracle 11g E-Business SuiteOracle SQL Developer - PL/SQL script analysisPositive software change management processes and procedures with CA HarvestIdentify, track, and analyze software and application defects using HP Quality CenterManage, track, and report all incidents for Services Support team in ServiceNow ITSMMonitor Demand Planning transactions and jobs in AppWorks UC4 V8 - Applications Manager and Logility Demand PlannerBusiness integration setup and support of business partners for B2B transactions with TIBCO information bus SOA software. Obtain file update details and file administration details from Unix/Linux serversCoordinate with Global Support Team to support error reporting and analyze possible solutions for Seagate Corporate Access Request SystemRole, Account, and Entitlement Creation for Access Request System and verification of gathered necessary information. Provisioning and revocation of access. -
Network And Security Systems Administrator (Contractor With T-Systems)Georg Fischer May 2014 - Jun 2014Schaffhausen, Chhttp://www.gfps.com/content/gfps/com/en.htmlhttp://www.t-systemsus.com/Located at Georg Fischer Central Plastics / Piping Systems in Shawnee, OK.Management of over 100 virtual servers using vSphere Client 4.0 – 5.1 using Linux vmkernal on ESXi hosts / Hypervisor. Upgraded 5.0 hosts to 5.1U2 and efficiently balanced server load for optimal performance.Administration of Citrix XenApp site and thin client access and administration for over 1000 users.Primarily responsible for all server operations, networking, administration, updates, and new configuration and deployment.Assist in troubleshooting of enterprise network firewall, switches, routers, AP's, and analyzing traffic when necessary using PRTG Network Monitor.Configuring and monitoring of NAS and SANs and site replications using Dell Compellent Enterprise Manager 6.2. Advanced configuration and deployment of Symantec Endpoint Protection across corporate domain using management console.Configuration and management of BackupExec 2010 backup solution. -
It AdministratorHal Smith Restaurant Group Apr 2013 - May 2014Norman, Oklahoma, Ushttps://www.ehsrg.com/Complete package IT Administrator providing top quality service and solutions to some of the best staff and management in the restaurant business. Linux administration of FTP server from site to site using SSL over Putty client. Monitoring of software, services and processes, and security client and updating patches on monthly basis.Implementation of Snare software client and configuration on over 60 clients for progressive steps toward PCI compliance.Administration of technical software and hardware for over 30 employees at The Hal Smith Restaurant Group corporate office in Norman, OK.Citrix server and virtual machine administration.Technical support for over 50 restaurants of HSRG in 7 states including building and deploying new Squirrel Systems Point of Sale Systems and their respective MS SQL 2005 database servers. Maintain and administer backup solution using ShadowProtect and SOS Online Backup solutions.Installation, management, and implementation of Cisco telecommunication servers, routers, switches, and phone systemsConfigured, management, implemented Aerohive wireless access points in several locations and became an Aerohive Certified Wireless Professional (ACWP)Active Directory configuration of new users and computers on corporate domainESET antivirus and security software installation and configuration using ESET Management ConsoleChampion of WaveSpot social wifi access points installation and administration in all restaurant locationsIT Administrator for Norman, Moore Corporate Office, and South OKC locations of Journey Church. Administrative support including all workstation, network, and server operations and security. -
Enterprise Mobility Administrator - Dod Contractor With Csi OklahomaDisa Aug 2012 - Mar 2013UsUtilize systems diagnostic and maintenance toolsets to ensure the availability, functionality, and security of over 120 physical and virtual MS Server 2008 R2 servers.These toolsets include Bladelogic, Systems Center Operations Manager, Host-Bases System Security,Vsphere Infrastructure Client,Windows Powershell, and Tivoli to develop STIG compliance audits, test and install MS Windows Server patches, implement system health monitors, and configure registry and policy settings for applications supporting Defense Enterprise Email. Applications supporting DEE include MS Active Directory, and Microsoft Exchange 2010.Provides expert technical guidance, interpretation, and implementation oversight to DEE customers, DoD and Defense Information Systems Agency security policies, processes, and practices to ensure continued operational availability and integrity of Blackberry Enterprise Server 5.0, Blackberry Administration Service 5.0, and Good Mobile Messaging applications, systems, networks, and data. Applies expert technical skill and authority in working with Tier IV RIM and Microsoft vendor support to resolve complex operational problems, analyzing system performance, and developing administration best practices for the DEE BES and BAS environment supporting over 80,000 DEE Blackberry device users on a Microsoft Exchange 2010 platform with over 1 million mailboxes. Develops and implements Active Directory group policies, HBSS policies, and Blackberry device IT policies to ensure Defense Enterprise Email BES and BAS application servers maintain Security Technical Implementation Guideline security requirements. -
Desktop Analyst (Contractor With Principal Technologies)Devon Energy May 2012 - Jun 2012Oklahoma City, Oklahoma, UsPromptly resolve Tier II service requests for employees of Devon Energy Service request range from ODBC database configuration issues, software installations, new hardware delivery and setup, SAP configuration issues, MS Lync 2010 conferencing and messaging, and MS Communicator 2007R2, and App Sense roaming profile configuration troubleshooting. Troubleshoot, install, and configure new system provisions and deprovisions, multi-functional devices, BlackBerry phones, Dell laptops and desktops, and a large variety of applicationsConsult with users to find best solution to IT needsAltiris configuration of OS, updates, and applications for new laptops and desktopsKnowledge of IT policies and procedures and enforcement of security policies and procedures including legal hold repossessions and quarantines. -
Computer Support Representative (Dod Contractor With Chickasaw Nation Industries It)United States Air Force Dec 2011 - May 2012Randolph Afb, Tx, UsActive Directory administration of over 8,000 Tinker AFB employeesTier II advanced troubleshooting of Tier I created Remedy tickets in advanced high security environmentTickets included troubleshooting of a large collection of software including legacy applications on Dell PC hardware. Led a large scale roll out of over 2500 user workstation upgrades to Windows 7 using MS SCCM 2007 for packaging and scheduled deployments.High volume scheduling and fast-paced performance of high quality customer service to manage high client volume -
It Specialist I (State Of Oklahoma Contractor)University Of Oklahoma Outreach Sep 2010 - Dec 2011Norman, Ok, UsResearched and implemented autodial software and open source CRM application and tailored to fit the needs of our operation. Created, edited, and reviewed technical documents for operational and use including: OKDHSLive! website, PhoneTree autodial software, and Sugar CRM application, as well as other functional specification documents for upcoming projects. Process center IT support liaison for IT administrator for staff of process center -
Systems Analyst InternUniversity Of Oklahoma May 2010 - Aug 2010Norman, Oklahoma, UsActive Directory integration to support deployment of a new computer lab infrastructure for all users of the OU Bizzell Library.Project included new acquisition of iMacs for the Bizzell Library and testing and implementation of the server and networking attributes for each new unit, as well as an integration of new and existing units into the directory systems of the servers.Created a technical document to report progress of the project to the Director. -
Counter Intelligence AgentBest Buy / Geek Squad Jun 2005 - Jun 2010UsEstablished high quality, prompt, results-driven, and proficient customer service of hardware and software troubleshooting and repairData recovery and backup services for in-store, home, and small business clientsClient home and small business infrastructure design and consultation expertProven proficiency of all departments of the store for best customer service experienceTracked all service orders for services performed in incident tracking software for analysis and reported to management team for process improvement analysis.Installation and configuration of Ubuntu on users laptops and desktops as secondary options for an operating system. Helped with instruction classes for users to learn Linux as an operating system. -
A Co Bstb - Combat Engineer Sergeant / Squad LeaderOklahoma Army National Guard May 2002 - Feb 2010Oklahoma City, Oklahoma, Us45th Infantry Bde | 245th Combat Engr CoAttended Primary Leadership Development Course – February of 2005 Promoted 5 grades to Sergeant within 3 years of service Received two Army Achievement Medals and two Army Commendation Medals and one Good Conduct MedalWorked as Company Information Security Officer with Secret Security Clearance on 12 month Iraq missionParticipated in surveillance and counter-surveillance operations in the process of gathering intelligence.Responsible for providing security for two Operational Detachment teams conducting Operational Preparation of the Environment in support of a compartmented mission in Central Iraq.Critical leadership role in maintaining the readiness of a military force protection element that provided security for over 30 United States citizens living amongst the local population. Established a fiduciary within the Force Protection element that enhanced weapons, communication, maneuver techniques, and security. Also enhanced security over the Sensitive Compartmented Information Facility (SCIF).Received Honorable Discharge from service in May of 2010.Medals: Combat Action Badge -
Associate ManagerBig Lots Feb 2004 - Jun 2005Columbus, Ohio, UsPromoted to Store Associate Manager within 3 months of employment Responsible for inventory management and merchandisingOperational performance of all departmentsPerformed hiring operations, i.e. interviews, paperwork, and new hire training, for 22 employees during employmentScheduling and logistics for 40 - 45 store personnel for over 6 months
Jeremy H. Skills
Jeremy H. Education Details
-
Oklahoma State UniversityManagement Information Systems -
University Of OklahomaInformation Science/Studies -
Oklahoma City Community CollegeBusiness -
Newcastle High SchoolDiploma
Frequently Asked Questions about Jeremy H.
What company does Jeremy H. work for?
Jeremy H. works for Changeis, Inc.
What is Jeremy H.'s role at the current company?
Jeremy H.'s current role is Security Architect | US Veteran | Cybersecurity Mentor | Volunteer Children's Sports Coach | Cyber OSINT Hunter | Homeschool Teacher.
What is Jeremy H.'s email address?
Jeremy H.'s email address is je****@****ail.com
What is Jeremy H.'s direct phone number?
Jeremy H.'s direct phone number is +140540*****
What schools did Jeremy H. attend?
Jeremy H. attended Oklahoma State University, University Of Oklahoma, Oklahoma City Community College, Newcastle High School.
What are some of Jeremy H.'s interests?
Jeremy H. has interest in Children.
What skills is Jeremy H. known for?
Jeremy H. has skills like Active Directory, Computer Security, Technical Support, Network Security, Security+, Security, Network Administration, It Project Management, Pc And Mac Hardware And Software, Mac Os X, Windows, Tcp/ip.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial